-
An Efficient Authentication Protocol for Smart Grid Communication Based on On-Chip-Error-Correcting Physical Unclonable Function
Authors:
Masoud Kaveh,
Mohammad Reza Mosavi,
Diego Martin,
Saeed Aghapour
Abstract:
Security has become a main concern for the smart grid to move from research and development to industry. The concept of security has usually referred to resistance to threats by an active or passive attacker. However, since smart meters (SMs) are often placed in unprotected areas, physical security has become one of the important security goals in the smart grid. Physical unclonable functions (PUF…
▽ More
Security has become a main concern for the smart grid to move from research and development to industry. The concept of security has usually referred to resistance to threats by an active or passive attacker. However, since smart meters (SMs) are often placed in unprotected areas, physical security has become one of the important security goals in the smart grid. Physical unclonable functions (PUFs) have been largely utilized for ensuring physical security in recent years, though their reliability has remained a major problem to be practically used in cryptographic applications. Although fuzzy extractors have been considered as a solution to solve the reliability problem of PUFs, they put a considerable computational cost to the resource-constrained SMs. To that end, we first propose an on-chip-error-correcting (OCEC) PUF that efficiently generates stable digits for the authentication process. Afterward, we introduce a lightweight authentication protocol between the SMs and neighborhood gateway (NG) based on the proposed PUF. The provable security analysis shows that not only the proposed protocol can stand secure in the Canetti-Krawczyk (CK) adversary model but also provides additional security features. Also, the performance evaluation demonstrates the significant improvement of the proposed scheme in comparison with the state-of-the-art.
△ Less
Submitted 23 July, 2023;
originally announced July 2023.
-
EPUF: A Novel Scheme Based on Entropy Features of Latency-based DRAM PUFs Providing Lightweight Authentication in IoT Networks
Authors:
Fatemeh Najafi,
Masoud Kaveh,
Mohammad Reza Mosavi,
Alessandro Brighente,
Mauro Conti
Abstract:
Physical unclonable functions (PUFs) are hardware-oriented primitives that exploit manufacturing variations to generate a unique identity for a physical system. Recent advancements showed how DRAM can be exploited to implement PUFs. DRAM PUFs require no additional circuits for PUF operations and can be used in most of the applications with resource-constrained nodes such as Internet of Things (IoT…
▽ More
Physical unclonable functions (PUFs) are hardware-oriented primitives that exploit manufacturing variations to generate a unique identity for a physical system. Recent advancements showed how DRAM can be exploited to implement PUFs. DRAM PUFs require no additional circuits for PUF operations and can be used in most of the applications with resource-constrained nodes such as Internet of Things (IoT) networks. However, the existing DRAM PUF solutions either require to interrupt other functions in the host system, or provide unreliable responses due to their sensitiveness to the environmental conditions.
In this paper, we propose EPUF, a novel strategy to extract random and unique features from DRAM cells to generate reliable PUF responses. In particular, we use the bitmap images of the binary DRAM values and their entropy features. We show via real device experiments that EPUF is approximately $1.7$ times faster than other state of the art solutions, achieves $100\%$ reliability, generates features with $47.79\%$ uniqueness, and supports a large set of CRP that leads to new potentials for DRAM PUF-based authentication. We also propose a lightweight authentication protocol based on EPUF, which not only provides far better security guarantees but also outperforms the state-of-the-art in terms of communication overhead and computational cost.
△ Less
Submitted 19 July, 2023;
originally announced July 2023.
-
An Adaptive Similarity Measure to Tune Trust Influence in Memory-Based Collaborative Filtering
Authors:
Mohammad Reza Zarei,
Mohammad R. Moosavi
Abstract:
The aim of the recommender systems is to provide relevant and potentially interesting information to each user. This is fulfilled by utilizing the already recorded tendencies of similar users or detecting items similar to interested items of the user. Challenges such as data sparsity and cold start problem are addressed in recent studies. Utilizing social information not only enhances the predicti…
▽ More
The aim of the recommender systems is to provide relevant and potentially interesting information to each user. This is fulfilled by utilizing the already recorded tendencies of similar users or detecting items similar to interested items of the user. Challenges such as data sparsity and cold start problem are addressed in recent studies. Utilizing social information not only enhances the prediction accuracy but also tackles the data sparseness challenges. In this paper, we investigate the impact of using direct and indirect trust information in a memory-based collaborative filtering recommender system. An adaptive similarity measure is proposed and the contribution of social information is tuned using two learning schemes, greedy and gradient-based optimization. The results of the proposed method are compared with state-of-the-art memory-based and model-based CF approaches on two real-world datasets, Epinions and FilmTrust. The experiments show that our method is quite effective in designing an accurate and comprehensive recommender system.
△ Less
Submitted 18 December, 2019;
originally announced December 2019.
-
A Social Recommender System based on Bhattacharyya Coefficient
Authors:
M. R. Zarei,
M. R. Moosavi
Abstract:
Recommender systems play a significant role in providing the appropriate data for each user among a huge amount of information. One of the important roles of a recommender system is to predict the preference of each user to some specific data. Some of these systems concentrate on user-item networks that each user rates some items. The main step for item recommendation is to predict the rate of unr…
▽ More
Recommender systems play a significant role in providing the appropriate data for each user among a huge amount of information. One of the important roles of a recommender system is to predict the preference of each user to some specific data. Some of these systems concentrate on user-item networks that each user rates some items. The main step for item recommendation is to predict the rate of unrated items. Each recommender system utilizes different criteria such as the similarity between users or social relations in the process of rate prediction. As social connections of each user affect his behaviors, it can be a valuable source to use in rate prediction. In this paper, we will provide a new social recommender system which uses Bhattacharyya coefficient in similarity computing to be able to evaluate similarity in sparse data and between users without co-rated items as well as integrating social ties into the rating prediction process.
△ Less
Submitted 13 November, 2018; v1 submitted 9 September, 2018;
originally announced September 2018.